An implementation framework (IF) for the national information assurance and cyber security strategy (NIACSS) of jordan

This paper proposes an implementation framework that lays out the ground for a coherent, systematic, and comprehensive approach to implement the National Information Assurance and Cyber Security Strategy (NIACSS) of Jordan. The Framework 1). Suggests a methodology to analyze the NIACSS, 2). Illustrates how the NIACSS analysis can be utilized to design strategic moves and develop an appropriate functional structure, and 3). proposes a set of adaptable strategic controls that govern the NIACSS implementation and allow achieving excellence, innovation, efficiency, and quality.The framework, if adopted, is expected to harvest several advantages within the following areas: information security implementation management, control and guidance, efforts consolidation, resource utilization, productive collaboration, and completeness. The framework is flexible and expandable; therefore, it can be generalized.

[1]  Bashar Nuseibeh,et al.  Expressing the relationships between multiple views in requirements specification , 1993, ICSE '93.

[2]  Celia Desmond,et al.  Project management office , 2014, IEEE Engineering Management Review.

[3]  Dongho Won,et al.  Advanced Information Security Management Evaluation System , 2011, KSII Trans. Internet Inf. Syst..

[4]  Joey Jansen van Vuuren,et al.  Cyber security awareness toolkit for national security: an approach to South Africa's cyber security policy implementation , 2011 .

[5]  Bernard H. Boar,et al.  The Art of Strategic Planning for Information Technology: Crafting Strategy for the 90s , 1993 .

[6]  Julio Cesar Sampaio do Prado Leite,et al.  Requirements Validation Through Viewpoint Resolution , 1991, IEEE Trans. Software Eng..

[7]  F. David How companies define their mission , 1989 .

[8]  Bernard H. Boar,et al.  The Art of Strategic Planning for Information Technology, Second Edition , 2000 .

[9]  Rossouw von Solms,et al.  Information Security Governance control through comprehensive policy architectures , 2011, 2011 Information Security for South Africa.

[10]  Edward Humphreys,et al.  Information security management system standards , 2011, Datenschutz und Datensicherheit - DuD.

[11]  Thomas M. Chen,et al.  An Assessment of The Department of Defense Strategy for Operating In Cyberspace , 2014 .

[12]  Wasfi Alrawabdeh,et al.  Internet and the arab world: understanding the key issues and overcoming the barriers , 2009, Int. Arab J. Inf. Technol..

[13]  Ian Sommerville,et al.  Viewpoints for requirements definition , 1992, Softw. Eng. J..